Sciweavers

1153 search results - page 166 / 231
» Compositional Specification Calculus for Information Systems...
Sort
View
CAISE
2001
Springer
15 years 8 months ago
Objects Control for Software Configuration Management
A major requirement in Software Engineering is to reduce the time to market. This requirement along with a demand for product sophistication and better quality has led to larger te...
Jacky Estublier
133
Voted
ICAI
2008
15 years 5 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang
133
Voted
JCP
2008
116views more  JCP 2008»
15 years 3 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
116
Voted
SIGSOFT
2004
ACM
16 years 4 months ago
Implementing protocols via declarative event patterns
This paper introduces declarative event patterns (DEPs) as a means to implement protocols while improving their traceability, comprehensibility, and maintainability. DEPs are desc...
Robert J. Walker, Kevin Viggers
JAISE
2010
169views Algorithms» more  JAISE 2010»
14 years 10 months ago
Responsive environments: User experiences for ambient intelligence
In this paper we review the emerging field of responsive environments as an ambient intelligence system with a focus on user experience. We see responsive environments as a combina...
Jorge Alves Lino, Benjamin Salem, Matthias Rauterb...